Security
Cyber threats have grown exponentially as the modern web and powerful AI systems have proliferated. We’re designing systems to secure the hybrid cloud and AI for sensitive datasets to ensure organizations can continue to operate safely and securely.
Overview
Cloud computing and AI have dramatically transformed global computational capabilities, yet they also introduce novel security risks. It’s why we're developing AI-powered tools for threat detection, investigation, and response that operate seamlessly across enterprise systems, cloud environments, and the edge.
Recognizing the looming challenges quantum computing poses, we're helping enterprises proactively deploy new quantum-safe encryption schemes.
Our pioneering technologies in confidential computing, decentralized trust, and a secure supply chain will enable more secure, zero-trust infrastructures for all.
Recognizing the looming challenges quantum computing poses, we're helping enterprises proactively deploy new quantum-safe encryption schemes.
Our pioneering technologies in confidential computing, decentralized trust, and a secure supply chain will enable more secure, zero-trust infrastructures for all.
Our work
Bringing quantum-safe security to IBM Quantum Platform, and the world
NewsChristopher Codella, Michael Maximilien, Paula Austel, Paul Schweigert, Mariam John, Navaneeth Rameshan, Martin Schmatz, Joachim Schäfer, and Robert DavisNIST’s post-quantum cryptography standards are here
NewsMichael Osborne, Katia Moskvitch, and Jennifer JanechekProtecting user data with fully homomorphic encryption and confidential computing
Technical noteOmri Soceanu and Zhongshu GuCrypto-agility and quantum-safe readiness
ExplainerRay Harishankar, Michael Osborne, Jai S. Arun, John Buselli, and Jennifer JanechekHow a scientist’s lifelong love of puzzles led to cryptography that could help quantum-proof the world
Deep DiveKatia MoskvitchCharting a path to quantum-safe transformation through industry initiatives
ExplainerLory Thorpe, John Buselli, and Jennifer Janechek- See more of our work on Security
Topics
- Cloud Security: Infrastructure and ApplicationsAdvancing the system integrity of cloud systems in mission-critical situations.
- Confidential ComputingThe cloud computing revolution has brought new security challenges. Confidential computing aims to protect applications and their data when running in the cloud. It works by consistently keeping the application and data encrypted, and only decrypting it inside the processor using keys known to the application/data owner and the processor.
- CryptographyBuilding the next generation of private, authenticated, and confidential communication cyrtopgraphy tools.
- Data and AI SecurityDesigning systems to monitor and protect sensitive data for robust and secure AI systems on the hybrid cloud.
- Quantum-Safe Cryptography and MigrationDesigning cryptographic algorithms that are quantum-safe to ensure the world’s digital infrastructure is secure.
- Threat ManagementBuilding the next wave of tools to help security teams detect and deflect against advanced cybersecurity threats.
Publications
- Ward Beullens
- 2024
- SAC 2024
- Manuel Barbosa
- Kai Gellert
- et al.
- 2024
- CRYPTO 2024
- Matilda Backendal
- Hannah Davis
- et al.
- 2024
- CRYPTO 2024
- Ngoc Khanh Nguyen
- Gregor Seiler
- 2024
- CRYPTO 2024
- Zicheng Wang
- Yicheng Guang
- et al.
- 2024
- USENIX Security 2024
- Hany Ragab
- Andrea Mambretti
- et al.
- 2024
- USENIX Security 2024
IBM Security Solutions
Innovations from our Security Research teams are regularly developed into cutting-edge new capabilities for IBM’s Security offerings.
Learn more
Projects
Synderella
A synthetic data generation service that enables secure and responsible analysis of privacy-sensitive data